KDPrint: Passive Authentication using Keystroke Dynamics-to-Image Encoding via Standardization
- URL: http://arxiv.org/abs/2405.01080v2
- Date: Fri, 3 May 2024 01:24:18 GMT
- Title: KDPrint: Passive Authentication using Keystroke Dynamics-to-Image Encoding via Standardization
- Authors: Yooshin Kim, Namhyeok Kwon, Donghoon Shin,
- Abstract summary: This paper proposes a passive authentication system that utilizes keystroke data, a byproduct of primary authentication methods, for background user authentication.
We introduce a novel image encoding technique to capture the temporal dynamics of keystroke data, overcoming the performance limitations of deep learning models.
Experimental results demonstrate that the proposed imaging approach surpasses existing methods in terms of information capacity.
- Score: 7.251941112707364
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In contemporary mobile user authentication systems, verifying user legitimacy has become paramount due to the widespread use of smartphones. Although fingerprint and facial recognition are widely used for mobile authentication, PIN-based authentication is still employed as a fallback option if biometric authentication fails after multiple attempts. Consequently, the system remains susceptible to attacks targeting the PIN when biometric methods are unsuccessful. In response to these concerns, two-factor authentication has been proposed, albeit with the caveat of increased user effort. To address these challenges, this paper proposes a passive authentication system that utilizes keystroke data, a byproduct of primary authentication methods, for background user authentication. Additionally, we introduce a novel image encoding technique to capture the temporal dynamics of keystroke data, overcoming the performance limitations of deep learning models. Furthermore, we present a methodology for selecting suitable behavioral biometric features for image representation. The resulting images, depicting the user's PIN input patterns, enhance the model's ability to uniquely identify users through the secondary channel with high accuracy. Experimental results demonstrate that the proposed imaging approach surpasses existing methods in terms of information capacity. In self-collected dataset experiments, incorporating features from prior research, our method achieved an Equal Error Rate (EER) of 6.7%, outperforming the existing method's 47.7%. Moreover, our imaging technique attained a True Acceptance Rate (TAR) of 94.4% and a False Acceptance Rate (FAR) of 8% for 17 users.
Related papers
- ID-Aligner: Enhancing Identity-Preserving Text-to-Image Generation with Reward Feedback Learning [57.91881829308395]
Identity-preserving text-to-image generation (ID-T2I) has received significant attention due to its wide range of application scenarios like AI portrait and advertising.
We present textbfID-Aligner, a general feedback learning framework to enhance ID-T2I performance.
arXiv Detail & Related papers (2024-04-23T18:41:56Z) - Biometrics Employing Neural Network [0.0]
Fingerprints, iris and retina patterns, facial recognition, hand shapes, palm prints, and voice recognition are frequently used forms of biometrics.
For systems to be effective and widely accepted, the error rate in recognition and verification must approach zero.
Artificial Neural Networks, which simulate the human brain's operations, present themselves as a promising approach.
arXiv Detail & Related papers (2024-02-01T03:59:04Z) - Unrecognizable Yet Identifiable: Image Distortion with Preserved Embeddings [22.338328674283062]
We introduce an innovative image transformation technique that renders facial images unrecognizable to the eye while maintaining their identifiability by neural network models.
The proposed methodology can be used in various artificial intelligence applications to distort the visual data and keep the derived features close.
We show that it is possible to build the distortion that changes the image content by more than 70% while maintaining the same recognition accuracy.
arXiv Detail & Related papers (2024-01-26T18:20:53Z) - Two-Factor Authentication Approach Based on Behavior Patterns for
Defeating Puppet Attacks [7.20329132808002]
PUPGUARD is a solution designed to guard against puppet attacks.
It is based on user behavioral patterns, specifically, the user needs to press the capture device twice successively with different fingers during the authentication process.
Our experimental results demonstrate that PUPGUARD achieves an impressive accuracy rate of 97.87% and a remarkably low false positive rate (FPR) of 1.89%.
arXiv Detail & Related papers (2023-11-17T08:35:02Z) - Fingerprint Image-Quality Estimation and its Application to
Multialgorithm Verification [56.128200319868526]
Signal-quality awareness has been found to increase recognition rates and to support decisions in multisensor environments significantly.
Here, we study the orientation tensor of fingerprint images to quantify signal impairments, such as noise, lack of structure, blur, with the help of symmetry descriptors.
The quantitative results favor quality awareness under all aspects, boosting recognition rates and fusing differently skilled experts efficiently as well as effectively.
arXiv Detail & Related papers (2022-11-24T12:17:49Z) - A high performance fingerprint liveness detection method based on
quality related features [66.41574316136379]
The system is tested on a highly challenging database comprising over 10,500 real and fake images.
The proposed solution proves to be robust to the multi-scenario dataset, and presents an overall rate of 90% correctly classified samples.
arXiv Detail & Related papers (2021-11-02T21:09:39Z) - Data-driven behavioural biometrics for continuous and adaptive user
verification using Smartphone and Smartwatch [0.0]
We propose an algorithm to blend behavioural biometrics with multi-factor authentication (MFA)
This work proposes a two-step user verification algorithm that verifies the user's identity using motion-based biometrics.
arXiv Detail & Related papers (2021-10-07T02:46:21Z) - Harnessing Unrecognizable Faces for Face Recognition [87.80037162457427]
We propose a measure of recognizability of a face image, implemented by a deep neural network trained using mostly recognizable identities.
We show that accounting for recognizability reduces error rate of single-image face recognition by 58% at FAR=1e-5.
arXiv Detail & Related papers (2021-06-08T05:25:03Z) - Multimodal Personal Ear Authentication Using Smartphones [0.0]
fingerprint authentication cannot be used when hands are wet, and face recognition cannot be used when a person is wearing a mask.
We examine a personal authentication system using the pinna as a new approach for biometric authentication on smartphones.
arXiv Detail & Related papers (2021-03-23T14:19:15Z) - Responsible Disclosure of Generative Models Using Scalable
Fingerprinting [70.81987741132451]
Deep generative models have achieved a qualitatively new level of performance.
There are concerns on how this technology can be misused to spoof sensors, generate deep fakes, and enable misinformation at scale.
Our work enables a responsible disclosure of such state-of-the-art generative models, that allows researchers and companies to fingerprint their models.
arXiv Detail & Related papers (2020-12-16T03:51:54Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.